Processing Foundation Processing version 3.4 and earlier contains a XML External Entity (XXE) vulnerability in loadXML() function that can result in An attacker can read arbitrary files and exfiltrate their contents via HTTP requests. This attack appear to be exploitable via The victim must use Processing to parse a crafted XML document.
References
Link | Resource |
---|---|
https://github.com/processing/processing/issues/5706 | Exploit Patch Third Party Advisory |
https://twitter.com/ben_fry/status/1054333613465059329 | Third Party Advisory |
https://github.com/processing/processing/issues/5706 | Exploit Patch Third Party Advisory |
https://twitter.com/ben_fry/status/1054333613465059329 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/processing/processing/issues/5706 - Exploit, Patch, Third Party Advisory | |
References | () https://twitter.com/ben_fry/status/1054333613465059329 - Third Party Advisory |
Information
Published : 2018-12-20 15:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-1000840
Mitre link : CVE-2018-1000840
CVE.ORG link : CVE-2018-1000840
JSON object : View
Products Affected
processing
- processing
CWE
CWE-611
Improper Restriction of XML External Entity Reference